Part 1-ensure you attach the required pds alongside the essay Use examples from the readings, or from your own research, to support your views, as appropriate. Encouraged to conduct research and use

Instructions: Add additional insight opinions or challenge opinions and you can visit a couple of the web sites contributed and share your opinion of these sites. Minimum of 150 words for each. 
1) From the obsolete analysis of the vulnerabilities associated with the cellular network, there are essentially two denials of services commonly known as the (DoS) vulnerabilities in the cellular network as well as the data services of a cellular network. (Stanford, 2002) These respective attacks may be said to consume insignificant amount of traffic to exploit the connection set up of the cellular network. Such traffic besides teardown the mechanisms employed out by the cellular networks. Therefore, there is need of using a publicly reliable specification that essentially facilitate an initial characterization of the respective attacks as well as a means of exhibiting the potential for the interferences of the data services in major metropolitan areas. (Stanford, 2002) 
One of the major and common vulnerability of a cellular data service network is essentially the network architecture which practically comprises the respective cellular network. (Bolot, 2006) Generally, before a GPRS or the EDGE network facilitates any given services to a mobile facility, a number of consequent attachments as well as authentications steps of follow ought to occur at first. On turning the device on, a mobile device always submits a GPRS attached message to the network. The foundation of this station sends again a message to the attached Serving GPRS Support Node (SGSN) that authenticates the identity of the user with th assistance of the Home Location Register (HLR) The HLR then enhance a voice as well as the data operation in the respective network via following the trace of the information including user location, reliability as well as the accessible services. (Karlin, 2000) This therefore makes the mobile phone to have a virtual connection with the respective cellular network service. This therefore make the cellular data services as well as the network vulnerable to this respective attack to the cellular network. 
The other possible vulnerability of the cellular network is basically the packet multiplexing on the air interface. Generally, the services of the data cellular network have been accessible as well as reliable from other cellular networks for a number of years. The respective circuit-switched services need a necessity that a single given endpoint ought to monopolize a channel for the overall duration of its connectivity to the respective network just as the case in the voice telephony. (McDaniel, 2006) The individual providing these services made implications of the charges on the user depending on the overall time of the connection. This is despite the fact that this connection was constantly used to stream the content or intermittently deliver packets. This therefore made the need for these services to go drastically fall down. As well, the insufficient as well as the poor services resulted to the creation of a pool of inconveniences that later subjected the services to such a vulnerability. This is essentially because of the inconsistent flow of packets hence making it to receive a unique MAC layer commonly referred to as the Temporary Flow Identifier. (Misra, 2005) The following subsequent had this mark labeled on them that was aimed at making the device to identify which packets to decode. 

Respond here in 150 words:


2) Both vulnerabilities facilitate denial of service attacks on vulnerable services. One vulnerability targets the process that tears down connections between the network and the end device and the other attack targets the process that sets these connections up. 
When a cell phone is in use it needs a connection to the network for operation. To establishing a connection is a multistep process and, even with modern technology and efficiencies, there still exist potential bottlenecks. In modern networks this is a common uplink channel called the PRACH (Packet Random Access Channel) (Traynor, McDaniel and La Porta, 2008, p. 5). Network contention due to a large number of connection requests may overload the mechanisms emplaced to minimize contention, acting as a Denial of Service as many subscribers or Internet based attackers flood the network with requests. Even if an Internet based attack was detected at gateways an attacker could leverage intimate understanding of the network and attack logical channels with a much less traffic but still achieve the same results. In short, malicious actors could focus on the most vulnerable part of the network given a deep understanding of how it operates, effectively plugging up the setup process and preventing legitimate users from accessing the network. 
Similarly, attacking channel tear down mechanisms has a similar result. Providers understand that channel set up and tear down both are time intensive processes. Each connection may only take microseconds to occur but extrapolated over thousands or tens of thousands of connections it can be a source of significant delay and CPU cycles. To minimize the possibility of the same device consistently tearing down and setting up a new connection the system uses various mechanisms to maintain connections for as long as they are needed without taking up unneeded resources. With respect to the tear down mechanism a network uses labels and specialized packets called Temporary Flow Identifiers (TFI) and Temporary Block Flows (TBF) (Traynor, et al., 2008, p. 4). The TFI labels identify the individual devices via MAC layer information and each packet in the TBF is marked with this TFI label so devices know which packets are for them. Immediate expiration of the TBF would mean that each device would need to make a new connection almost immediately so a timing function is used to account for minor network contention or slight variances in packet arrival. Each additional packet resets this timer to zero. If an attacker can send enough packets to delay expiration of the TBFs indefinitely they could tie up enough resources to prevent other users from joining. 
Although very similar in effect both of these attacks use different vectors to achieve their results. A malicious group or individual with intimate knowledge of cell networks infrastructure and processes could effectively tie up a network, causing mayhem in a number of ways to include preventing emergency calls and other critical services from being used. 

Respond here in 150 words